Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Security Concepts and Implementation in the Ara Mobile Agent System
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Concordia: An Infrastructure for Collaborating Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
Domain Experts for Information Retrieval in the World Wide Web
CIA '98 Proceedings of the Second International Workshop on Cooperative Information Agents II, Learning, Mobility and Electronic Commerce for Information Discovery on the Internet
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Safe, Untrusted Agents Using Proof-Carrying Code
Mobile Agents and Security
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Mobile agents for network management
IEEE Communications Surveys & Tutorials
Component-based mediation services for the integration of medical applications
Artificial Intelligence in Medicine
Hi-index | 0.00 |
FIPA specification enables the interoperability among a diversity of agent platforms in a highly heterogeneous computing environment. Agents of different systems or providers, as far as they are all FIPA-compliant, can communicate and interact directly by Agent Communication Language (ACL). However, potential security threats in agent platforms are not fully addressed in both the FIPA specification and most of its implementations such as FIPA-OS. In order to add security features to FIPA, we propose a two-layer architecture that includes a security layer as the security extension to FIPA-OS. This architecture provides two types of security-related services to agents: a secure communication service which prevents any eavesdropping or interference from the outside network, and a secure execution environment service which protects server resources and agent services from any unauthorized access of agents. In this paper we present the design and implementation of this architecture as well as the trust model.